全文获取类型
收费全文 | 1401篇 |
免费 | 80篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 19篇 |
化学工业 | 376篇 |
金属工艺 | 33篇 |
机械仪表 | 22篇 |
建筑科学 | 57篇 |
矿业工程 | 3篇 |
能源动力 | 41篇 |
轻工业 | 128篇 |
水利工程 | 10篇 |
无线电 | 114篇 |
一般工业技术 | 293篇 |
冶金工业 | 119篇 |
原子能技术 | 13篇 |
自动化技术 | 260篇 |
出版年
2023年 | 10篇 |
2022年 | 11篇 |
2021年 | 24篇 |
2020年 | 25篇 |
2019年 | 24篇 |
2018年 | 33篇 |
2017年 | 38篇 |
2016年 | 48篇 |
2015年 | 35篇 |
2014年 | 61篇 |
2013年 | 90篇 |
2012年 | 88篇 |
2011年 | 85篇 |
2010年 | 83篇 |
2009年 | 77篇 |
2008年 | 92篇 |
2007年 | 62篇 |
2006年 | 49篇 |
2005年 | 58篇 |
2004年 | 54篇 |
2003年 | 46篇 |
2002年 | 44篇 |
2001年 | 17篇 |
2000年 | 22篇 |
1999年 | 18篇 |
1998年 | 48篇 |
1997年 | 22篇 |
1996年 | 19篇 |
1995年 | 15篇 |
1994年 | 20篇 |
1993年 | 20篇 |
1992年 | 8篇 |
1991年 | 13篇 |
1990年 | 11篇 |
1989年 | 11篇 |
1988年 | 9篇 |
1987年 | 10篇 |
1986年 | 9篇 |
1985年 | 12篇 |
1984年 | 11篇 |
1983年 | 5篇 |
1982年 | 13篇 |
1981年 | 4篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1976年 | 3篇 |
1975年 | 5篇 |
1974年 | 3篇 |
1971年 | 3篇 |
1968年 | 2篇 |
排序方式: 共有1488条查询结果,搜索用时 31 毫秒
31.
Jeanne Volatron Florent Carn Jelena Kolosnjaj‐Tabi Yasir Javed Quoc Lam Vuong Yves Gossuin Christine Ménager Nathalie Luciani Gaëlle Charron Miryana Hémadi Damien Alloyeau Florence Gazeau 《Small (Weinheim an der Bergstrasse, Germany)》2017,13(2)
Proteins implicated in iron homeostasis are assumed to be also involved in the cellular processing of iron oxide nanoparticles. In this work, the role of an endogenous iron storage protein—namely the ferritin—is examined in the remediation and biodegradation of magnetic iron oxide nanoparticles. Previous in vivo studies suggest the intracellular transfer of the iron ions released during the degradation of nanoparticles to endogenous protein cages within lysosomal compartments. Here, the capacity of ferritin cages to accommodate and store the degradation products of nanoparticles is investigated in vitro in the physiological acidic environment of the lysosomes. Moreover, it is questioned whether ferritin proteins can play an active role in the degradation of the nanoparticles. The magnetic, colloidal, and structural follow‐up of iron oxide nanoparticles and proteins in lysosome‐like medium confirms the efficient remediation of potentially harmful iron ions generated by nanoparticles within ferritins. The presence of ferritins, however, delays the degradation of particles due to a complex colloidal behavior of the mixture in acidic medium. This study exemplifies the important implications of intracellular proteins in processes of degradation and metabolization of iron oxide nanoparticles. 相似文献
32.
Unraveling Unprecedented Charge Carrier Mobility through Structure Property Relationship of Four Isomers of Didodecyl[1]benzothieno[3,2‐b][1]benzothiophene 下载免费PDF全文
Yusuke Tsutsui Guillaume Schweicher Basab Chattopadhyay Tsuneaki Sakurai Jean‐Baptiste Arlin Christian Ruzié Almaz Aliev Artur Ciesielski Alan R. Kennedy Vincent Lemaur Yoann Olivier Rachid Hadji Lionel Sanguinet Frédéric Castet Silvio Osella Dmytro Dudenko David Beljonne Jérôme Cornil Paolo Samorì Shu Seki Yves H. Geerts 《Advanced materials (Deerfield Beach, Fla.)》2016,28(33):7106-7114
33.
Yves Younan Pieter Philippaerts Frank Piessens Wouter Joosen Sven Lachmund Thomas Walter 《Journal in Computer Virology》2011,7(3):173-188
Code injection attacks are one of the most powerful and important classes of attacks on software. In these attacks, the attacker sends malicious input to a software application, where it is stored in memory. The malicious input is chosen in such a way that its representation in memory is also a valid representation of a machine code program that performs actions chosen by the attacker. The attacker then triggers a bug in the application to divert the control flow to this injected machine code. A typical action of the injected code is to launch a command interpreter shell, and hence the malicious input is often called shellcode. Attacks are usually performed against network facing applications, and such applications often perform validations or encodings on input. Hence, a typical hurdle for attackers, is that the shellcode has to pass one or more filtering methods before it is stored in the vulnerable application??s memory space. Clearly, for a code injection attack to succeed, the malicious input must survive such validations and transformations. Alphanumeric input (consisting only of letters and digits) is typically very robust for this purpose: it passes most filters and is untouched by most transformations. This paper studies the power of alphanumeric shellcode on the ARM architecture. It shows that the subset of ARM machine code programs that (when interpreted as data) consist only of alphanumerical characters is a Turing complete subset. This is a non-trivial result, as the number of instructions that consist only of alphanumeric characters is very limited. To craft useful exploit code (and to achieve Turing completeness), several tricks are needed, including the use of self-modifying code. 相似文献
34.
In this study, a two-machine flowshop producing identical parts is considered. Each of the identical parts is assumed to require
a number of manufacturing operations, and the machines are assumed to be flexible enough to perform different operations.
Due to economical or technological constraints, some specific operations are preassigned to one of the machines. The remaining
operations, called flexible operations, can be performed on either one of the machines, so that the same flexible operation
can be performed on different machines for different parts. The problem is to determine the assignment of the flexible operations
to the machines for each part, with the objective of maximizing the throughput rate. We consider various cases regarding the
number of parts to be produced and the capacity of the buffer between the machines. We present solution methods for each variant
of the problem. 相似文献
35.
The subgraph isomorphism problem consists in deciding if there exists a copy of a pattern graph in a target graph. We introduce
in this paper a global constraint and an associated filtering algorithm to solve this problem within the context of constraint
programming. The main idea of the filtering algorithm is to label every node with respect to its relationships with other
nodes of the graph, and to define a partial order on these labels in order to express compatibility of labels for subgraph
isomorphism. This partial order over labels is used to filter domains. Labelings can also be strengthened by adding information
from the labels of neighbors. Such a strengthening can be applied iteratively until a fixpoint is reached. Practical experiments
illustrate that our new filtering approach is more effective on difficult instances of scale free graphs than state-of-the-art
algorithms and other constraint programming approaches. 相似文献
36.
A new approach for the source quantification has been developed on the basis of real air pollutant hourly concentrations of SO2, measured by three monitoring stations, during 9 h, around a group of three industrial sources. This inverse problem has been solved by coupling a direct model of diffusion (Pasquill’s Gaussian model) with a genetic algorithm, to search solutions leading to a minimum error between model outputs and measurements. The inversion performance depends on the relationship between the wind field and the configuration sources–receptors: good results are obtained when the monitoring stations are downwind from the sources, and in these cases, the order of magnitude of emissions is retrieved, sometimes with less than 10% error for at least two sources; there are some configurations (wind direction versus source and receptor locations) which do not permit to restore emissions. The latter situations reveal the need to conceive a specific network of sensors, taking into account the source locations and the most frequent weather patterns. 相似文献
37.
Henning Gruendl Patrick Riehmann Yves Pausch Bernd Froehlich 《Computer Graphics Forum》2016,35(3):321-330
We present a natural extension of two‐dimensional parallel‐coordinates plots for revealing relationships in time‐dependent multi‐attribute data by building on the idea that time can be considered as the third dimension. A time slice through the visualization represents a certain point in time and can be viewed as a regular parallel‐coordinates display. A vertical slice through one of the axes of the parallel‐coordinates display would show a time‐series plot. For a focus‐and‐context Integration of both views, we embed time‐series plots between two adjacent axes of the parallel‐coordinates plot. Both time‐series plots are drawn using a pseudo three‐dimensional perspective with a single vanishing point. An independent parallel‐coordinates panel that connects the two perspectively displayed time‐series plots can move forward and backward in time to reveal changes in the relationship between the time‐dependent attributes. The visualization of time‐series plots in the context of the parallel‐coordinates plot facilitates the exploration of time‐related aspects of the data without the need to switch to a separate display. We provide a consistent set of tools for selecting and contrasting subsets of the data, which are important for various application domains. 相似文献
38.
François Galasso Yves Ducq Matthieu Lauras Didier Gourc Mamadou Camara 《Journal of Intelligent Manufacturing》2016,27(1):217-229
Enterprise applications and software systems need to be interoperable in order to achieve seamless business across organizational boundaries and thus realize virtual networked organizations. Our proposition can be considered as an interoperability project selection approach and is based on three steps: (1) Modelling both collaborative business processes and potential related interoperability projects; (2) Evaluating the accessibility of each project regarding the current state of the organization; (3) Simulating each project and assessing the associated performance. These results are finally projected on a comparison matrix used as a decision support to select the most appropriate interoperability solution. An application case extracted from the French aerospace sector demonstrates the applicability and the benefits of the proposition. 相似文献
39.
One has a large computational workload that is “divisible” (its constituent tasks’ granularity can be adjusted arbitrarily) and one has access to p remote computers that can assist in computing the workload. How can one best utilize the computers? Two features complicate this question. First, the remote computers may differ from one another in speed. Second, each remote computer is subject to interruptions of known likelihood that kill all work in progress on it. One wishes to orchestrate sharing the workload with the remote computers in a way that maximizes the expected amount of work completed. We deal with three versions of this problem. The simplest version ignores communication costs but allows computers to differ in speed (a heterogeneous set of computers). The other two versions account for communication costs, first with identical remote computers (a homogeneous set of computers), and then with computers that may differ in speed. We provide exact expressions for the optimal work expectation for all three versions of the problem - via explicit closed-form expressions for the first two versions, and via a recurrence that computes this optimal value for the last, most general version. 相似文献
40.
Digital microfluidic design and optimization of classic and new fluidic functions for lab on a chip systems 总被引:2,自引:2,他引:0
Yves Fouillet Dorothée Jary Claude Chabrol Patricia Claustre Christine Peponnet 《Microfluidics and nanofluidics》2008,4(3):159-165
This paper deals with microfluidic studies for lab-on-a-chip development. The first goal was to develop microsystems immediately
usable by biologists for complex protocol integrations. All fluid operations are performed on nano-liter droplet independently
handled solely by electrowetting on dielectric (EWOD) actuation. A bottom-up architecture was used for chip design due to
the development and validation of elementary fluidic designs, which are then assembled. This approach speeds up development
and industrialization while minimizing the effort in designing and simplifying chip-fluidic programming. Dispensing reproducibility
for 64 nl droplets obtained a CV below 3% and mixing time was only a few seconds. Ease of the integration was demonstrated
by performing on chip serial dilutions of 2.8-folds, four times. The second part of this paper concerns the development of
new innovative fluidic functions in order to extend EWOD-actuated digital fluidics’ capabilities. Experiments of particle
dispensing by EWOD droplet handling are reported. Finally, work is shown concerning the coupling of EWOD actuation and magnetic
fields for magnetic bead manipulation. 相似文献